Need help! Security question - I left my computer on at work and want to know how I can tell if anyone looked around

I left my dell laptop on (full power....does not go to sleep or anything). I left it in the conference room totally exposed! When I came into work I realized I left it in there and it was logged off. If I have my setting set to never go off will it eventually do so? How can I tell if anyone got on and looked around?

You could first find out when your system was logged off in the Event Log.

Control Panel -> Adminstrative Tools-> Event Viewer-> Security

Search under the Logon/Logoff Event Category for Event 538. This event informs that the User has logged off. If it is possible for another user to login then you should be able to find the logs there for that particular user.

Also check the Application Log ... to find for any access during for period when your system was not used.

as libin_v said looking through the event log and seeing that any sort of activity was done through the time you were out of the conference room(like log off or application restarts etc) would tell you the problem....also do a search in windows search for the files for the files modified today and checked just like above for any files modified during that time to see what files were opened....

although the always on setting is not that bad for a leptop try using WindowsKey+L to logoff when you are leaving the room next time...also

Also, check your browser history, sorted by date/time.
If someone used the browser with your logon, you will see the history...or you will see no history because he/she deleted it. Either way will show IE activity.

Featured Post

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

If you get continual lockouts after changing your Active Directory password, there are several possible reasons. Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.

If you're not part of the solution, you're part of the problem.
Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet. Use PRTG Network Monitor as one of the building blocks, to detect unusual…

Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message. In the To field, type your recipient's fax number @efaxsend.com.
You can even send a secure international fax — just include t…

Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…